When moving to cloud, don’t lift-and-shift your security techniques
Cloud security means protecting workloads, not systems, and old ideas about endpoint protection no longer apply
David Braue | 12 Nov | Read more
Cloud security means protecting workloads, not systems, and old ideas about endpoint protection no longer apply
David Braue | 12 Nov | Read more
Every breach, whether it’s a Distributed Denial of Service (DDoS) attack, hack of a corporate database or phishing attack starts in the same place. An endpoint device is accessed and used by an unauthorised party or a user is coerced into using that endpoint in an unintended way.
Anthony Caruana | 06 Dec | Read more
Australian businesses must get more proactive about identifying potential breaches of sensitive credit-card, healthcare and other information before it's exfiltrated from the company, according to one vendor who says sensitive data – and, often, the laptops they're stored on – are disappearing from Australian businesses at a surprising rate.
David Braue | 28 Sep | Read more
The concept of online marketplaces was pioneered by eBay and Amazon many years ago. But these horizontal marketplaces are now being disrupted by vertical marketplaces such as Uber and Airbnb, which use technology to greatly improve the experience of buying and selling of traditional offline transactions. In doing so, these organisations have a well thought out value proposition which is flawlessly executed.
Nigel Phair | 20 Sep | Read more
Growth in use of encrypted mobile services will drive a reconsideration of the best methods for endpoint protection in the next 12 to 18 months, the local head of a new entrant to Australia's burgeoning security market believes.
David Braue | 21 Dec | Read more
Insecure by design and trusted by default, embedded systems present security concerns that could prove crippling
Paul Roberts | 02 Jun | Read more
Apple has improved its security in recent years, but is it enough?
Bob Violino | 10 Mar | Read more
If you travel to China or Russia, assume government or industry spooks will steal your data and install spyware. Here's how to thwart them
Bob Violino | 04 Dec | Read more
A recent study from the Enterprise Strategy Group (ESG) “Trends in Endpoint Security” study shows that security teams want more effective, more efficient cloud based solutions. With the endpoint being the target of most cyber attacks, endpoint security is rising in prominence. However according to the report, there is a complete lack of confidence in current AV solutions meaning that organisations are adding bolt-on technology for better protection, which in turn creates endpoint bloat and less efficiency.